Skip to main content

S175 - CRYPTOGRAPHY AND NETWORK SECURITY

S175 - CRYPTOGRAPHY AND NETWORK SECURITY

Course Educational Objectives:

The main goal of this course is to provide you with a background, foundation, and insight into the many dimensions of information security. This knowledge will serve as basis for further deeper study into selected areas of the field, or as an important component in your further studies and involvement in computing as a whole.

The primary objectives of the course are to help you:

1. Understand information security’s importance in our increasingly computer-driven world.

2. Master the key concepts of information security and how they “work.”

3. Develop a “security mindset:” learn how to critically analyze situations of computer and network usage from a security perspective, identifying the salient issues, viewpoints, and trade-offs.

4. Clearly and coherently communicate (both verbally and in writing) about complex technical topics.

Course Outcomes: After completion of the course students are able to:

1. Define the concepts and definition of the information security

2. Differentiate between several types of Security attacks, Services and Mechanisms

3. Identify the threats to information security

4. Show how to protect information recourses

5. Show how to maintaining and protecting information system


UNIT - I INTRODUCTION: Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs. Symmetric Encryption and Message Authentication: Conventional Encryption Principles, Conventional encryption algorithms(DES, Triple DES), cipher block modes of operation(CBC,CFB), location of encryption devices, key distribution. Message Authentication: Approaches to Message Authentication, Secure Hash Functions and HMAC.

Slides: https://drive.google.com/open?id=19P4vYFqN36VV3w-UPPbwHQb76WheMlcG

Questions: https://drive.google.com/open?id=1MWl9OpG5rUaAlJbyiaEYXtXKa1X4p9ky


UNIT - II Public Key Cryptography: Public key cryptography principles, public key cryptography algorithms, digital signatures, digital Certificates, Certificate Authority and key management Authentication Applications: Kerberos, X.509 Directory Authentication Service.

Slides: https://drive.google.com/file/d/1BykvyRHzlr4ivfXBPfeUgCLn9RlcSzHQ/view?usp=sharing

Questions: https://drive.google.com/open?id=16-iexQLS4TYLcY4JRa1xhbDJH3h5nizR

UNIT - III Email privacy: Pretty Good Privacy (PGP) and S/MIME. IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations.

Slides:https://drive.google.com/file/d/1R2BI5cpynA_sX6jP_57T8QnIRrc8XLq0/view?usp=sharing

Questions: https://drive.google.com/open?id=16e2hLBXOOSksU47tagB8ihrRZ8FQW8be


UNIT - IV Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET).
Slides:https://drive.google.com/open?id=1hH_XmGtw4z1DQS0h6v5BUlgjYfYPeH21
Questions:https://drive.google.com/open?id=1IzV8MzP1ELH0ap1YxTtE5GhXG7QGZCIn



UNIT  V : Intruders: Intruders Malicious Software: Viruses and related threats. Firewalls: Firewall Design principles, Trusted Systems
Slides:
Material: https://drive.google.com/openid=0BzCAANPvUvmtTzRUV3hWaUJiMFozUVFzNi1fOWRBSlo0UG9J
Slides: https://drive.google.com/open?id=1hWwFIaFlCPGJSlrv6oYk4w4QlVl9lrH6
Questions: https://drive.google.com/open?id=1zIfhN3zuhPd60Dq_xGBsrpbi2Hu-yaGv

TEXT BOOKS:

1. William Stallings, “Network Security Essentials (Applications and Standards)”, Pearson Education.

2. William Stallings, ” Cryptography and network Security”, PHI/Pearson, Third edition


REFERENCES:

1. Whitman, “Principles of Information Security”, Thomson.

2. Robert Bragg, Mark Rhodes, “Network Security: The complete reference”, TMH

3. Bachmann, “Introduction to Cryptography”, Springer publications. https://www.lbrce.ac.in/autonomous/R%2014%20UG%20Syllabus/IT.pdf


Lab:

RC4 Algorithm: https://drive.google.com/file/d/1hEvBBdnaYHbqKPLXiYUv2HxlV3NTmRNK/view?usp=sharing

Comments

  1. The article was up to the point and described the information very effectively. Thanks to blog author for wonderful and informative post.
    Security System Provider

    ReplyDelete
  2. Excellent Blog! Thank you so much for sharing this information. We are also providing network security services in the UK

    ReplyDelete
  3. A smart strategy to give your network the protection it needs against the various security threats is a layered security approach

    utm network security

    ReplyDelete
  4. Great post i must say and thanks for the information.
    Cyber security Online Training

    ReplyDelete
  5. came across very late.....but very useful Security App Development

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete
  7. This comment has been removed by the author.

    ReplyDelete
  8. Thanks For Sharing Such A Informative Post On This Portal. Want To See More Post Like This.
    Thanks
    Online Tutoring Services In Noida



    ReplyDelete
  9. Thanks for the detail blog.The blog contain informational content about the topic.We really appreciate your effort in posting such an valuable topic.
    For more informaion visit- network security certifications

    ReplyDelete
  10. Thanks for the detailed blog.The blog is informative that can easily attract the attention of the of anty person towards itself.You may also visit to the
    GLobal Tech Council to find the better deal in our services.

    Visit- Network security engineer certifications

    ReplyDelete
  11. Nice tutorial. Thanks for sharing the valuable info about c Training. it’s really helpful. Who want to learn c language this blog most helpful. Keep sharing on updated tutorials. Please see my site below.
    DIS
    HLA

    ReplyDelete
  12. Thanks For Sharing Such A Useful Information. In Future Waiting For More Post Like This.
    Government Job Training Certificate In Noida
    Computer Training Center In Noida
    Thanks


    ReplyDelete
  13. Thanks For Sharing Such A Useful Information. I request You To Post More Content Like This.

    Engineering Maths Back Year Tuition
    Thanks

    ReplyDelete
  14. computer repair new jersey Thanks for a very interesting blog. What else may I get that kind of info written in such a perfect approach? I’ve a undertaking that I am simply now operating on, and I have been at the look out for such info.

    ReplyDelete
  15. Thanks for a very interesting blog. Its very useful post thanks for sharing!

    ReplyDelete
  16. If you made up your mind to enroll for an online home tuition for English in Oman, you can boost your chances of getting a prestigious job. Luckily, we provide many options in terms of classes to the ones who look to get the best English classes in the UAE. Want to start online tuitions with ziyyara.

    ReplyDelete
  17. Looking for Bahrain Online Classes at afordable price? Ziyyara Edutech providing online live one-on-one tuition where both tutors and students can interact with each other via using an online whiteboard enabled with audio & video feature. Book your free demo on +91-9654271931

    ReplyDelete
  18. Great Blog I Have Read Your Blog It Is Very Useful For Me Thank you for posting and sharing such great information.can you help me in finding out more detail on Fundamentals of Cryptography.

    ReplyDelete
  19. Nice information…very well and clearly explained… Thank you so much for this valuable information…Great work keep doing. Looking for the best cyber security services in Hyderabad at affordable prices contact cyanous software solutions.

    Best cyber security services in Hyderabad
    Best software & web development company in Hyderabad

    ReplyDelete
  20. cyber security services in usa
    We offer a unique array of services like NERC CIP compliance, industrial Cyber security (IoT & IIoT), NIST ICS readiness, Site Assessment Testing, Critical Infrastructure Maturity Assessment, Digital Transformation Blueprint, Cloud Security Assessment, PCI-DSS Compliance, SOC Audits, and Penetration testing services and more.

    ReplyDelete
  21. Nice content, Thanks for shear the beautiful content. If anyone want to know What is Network Security you can visit my blog.

    ReplyDelete
  22. This post is so helpfull and interavtive.Keep updating with more informaion...
    Cyber Security Technologies
    Cyber Attacks

    ReplyDelete
  23. Thanks For Sharing Such A Informative Post On This Portal. Want To See More Post Like This.
    Thanks

    ReplyDelete
  24. thank you for posting this blog it really means a lot, appreciate the efforts putting your post, if you want you can check out
    data science course in bangalore
    data science course

    ReplyDelete
  25. Hi dear,

    Thank you for this wonderful post. It is very informative and useful. I would like to share something here too.Η Netking ξεκίνησε να αναπτύσσει ιστότοπους το 2004 και έχει εξελιχθεί σε αξιόπιστο συνεργάτη κατασκευής ιστοσελίδων για εταιρείες και επιχειρήσεις. Γνωρίζουμε ευρείες λύσεις που τροφοδοτούνται από τις τελευταίες τεχνολογίες και τάσεις. Βοηθώντας τους συνεργάτες μας να επιτύχουν τους στόχους τους βοηθάμε και εμάς να γινόμαστε ολοένα και καλύτεροι.Συνεργαζόμαστε για έναν κοινό στόχο και έχουμε κοινά συμφέροντα. Δουλεύουμε μαζί. Αναπτυσσόμαστε μαζί. Πιστεύουμε στην τελική ικανοποίηση του πελάτη και δεν αποφεύγουμε την επαναλειτουργία αν αυτό προσθέτει αξία στο έργο και είναι απολύτως απαραίτητο.


    κατασκευη ιστοσελιδων

    ReplyDelete
  26. Thanks for posting such a wonderfull blog really it was very informotive and knowledgable.I really appreciate interesting articles like yours. This is very good content. Your points are represented with original writing and your content is well-written,keep up the good work.Bea’s Booth capture your special moments and turn them into beautiful prints that you can cherish forever. A Bea's Booth Photo Booth or Interactive Magic Mirror, will prove a fun and unique addition to any party - what will have been a great event for all.For more details visit Visit Bea’s Booth!

    ReplyDelete
  27. Nice content, Thanks for shear the beautiful content.

    ReplyDelete
  28. I just wanted to say this is an elegantly composed article as we have seen here. I got some knowledge from your article and also it is a significant article for us. Thanks for sharing an article like this.

    Vulnerability In Network Security

    ReplyDelete

  29. <a href="https://telegra.ph/Learn-Cyber-Security-Training-Course-Effectively-03-02
    >Cyber Security training in Gurgaon
    </a>

    ReplyDelete
  30. I exploit solely premium quality products -- you will observe these individuals on: Network Security Test

    ReplyDelete
  31. Excellent article. Very interesting to read. I really love to read such a nice article. Thanks! keep rocking. application security testing

    ReplyDelete
  32. Thanks for posting this info. I just want to let you know that I just check out your site and I find it very interesting and informative. I can't wait to read lots of your posts.

    Managed Network Security
    Cisco Network Support

    ReplyDelete
  33. This comment has been removed by the author.

    ReplyDelete
  34. Thanks for sharing this informative post! It would be helpful for those who want to know about network security

    ReplyDelete
  35. In today's world of digitalization, the need for cybersecurity has become more important than ever. As technology advances, so do the threats and risks of cyberattacks. This is why Cyber Security in Gurgaon
    APTRON is essential for individuals and organizations to keep themselves protected.

    ReplyDelete
  36. If you are looking for online tutoring services in UAE for your kid, then we are here to serve you the best. Register yourself with Ziyyara to get affordable online tuition in middle east.
    Call us - +91 9654271931 (India) , +971- 505593798 (UAE)

    ReplyDelete
  37. I really liked your blog and I got many information from your blog thank so much for sharing this blog with us. cyber defense services in the UAE also provide assistance in responding to cyber attacks, helping companies to quickly and efficiently recover from a breach. Visit here also…

    Cyber defense services UAE

    ReplyDelete
  38. I appreciate the insightful content of this blog! Cybersecurity is crucial in today's digital age. If you're looking to enhance your skills and knowledge, check out our website for top-notch Cyber Security Courses in India. Stay safe online!

    ReplyDelete
  39. Comprehensive Cybersecurity Solutions for Business Continuity

    Cybersecurity services offer comprehensive protection for businesses, safeguarding data and systems from cyber threats. This encompasses proactive measures like vulnerability assessments and employee training, alongside reactive incident response to swiftly recover from attacks.

    ReplyDelete

Post a Comment

Popular posts from this blog

Business Intelligence and Big Data

S152 - BUSINESS INTELLIGENCE AND BIG DATA   COURSE EDUCATIONAL OBJECTIVES: The course covers Big Data Fundamentals, including the characteristics of Big Data, the sources Big Data (such as social media, sensor data, and geospatial data), as well as the challenges imposed around information management, data analytics, privacy and security, as well as platforms and architectures. Emphasis will be given to non-relational databases by examining techniques for storing and processing large volumes of structured and unstructured data, streaming data as well as complex analytics on them. Data warehouses will also be presented as a solution to handling big data and business intelligence applications. Business Intelligence (BI) systems in terms of its tools, current practices and impacts .The students should acquire knowledge on how to design BI solutions for different BI targets and users. COURSE OUTCOMES: At the end of this course, you should be able to: CO1: Outline basic concept

Data Mining and Data Warehousing

Data Mining and Data Warehousing Pre-Requisite:  Database Management Systems COURSE EDUCATIONAL OBJECTIVES (CEOs) :  Students will be enabled to understand and implement classical models and algorithms in data warehousing and data mining. They will learn how to analyze the data, identify the problems, and choose the relevant models and algorithms to apply. COURSE OUTCOMES (COs):  At the end of the course, students are able to CO 1 Understand the basic concepts of data warehouse & data mining. CO 2 Apply data pre-processing, generalization and data characterization techniques to provide suitable input for a range of data mining algorithms. CO 3 Analyze and provide solutions for real world problems using mining association techniques. CO 4 Examine the different classification & clustering techniques in data mining. CO 5 Apply data mining techniques to complex data objects like spatial data, multimedia data and web mining. TEXT BOO